Results 41 to 50 of about 39,218 (293)

Public key based key distribution scheme for wireless sensor networks

open access: yesTongxin xuebao, 2011
Since key pre-distribution schemes based on symmetric key can not completely solve security problems of keys distribution in WSN,a new public key based key distribution scheme was proposed.In the scheme,public key set was generated by an initial public ...
HUANG Jie1, HUANG Bei1
doaj   +2 more sources

Apply Block Ciphers Using Tiny Encryption Algorithm (TEA)

open access: yesمجلة بغداد للعلوم, 2010
Ciphers can be either symmetric-key or public-key. Symmetric-key ciphers are the most famous and important elements in many cryptographic systems. Individually, they provide confidentiality and privacy.
Hana Rashied Ismaeel
doaj   +1 more source

NARSKCA: Novel and robust symmetric key cryptography algorithm

open access: yesInternational Journal of Scientific World, 2015
In this research paper, a novel and strong symmetric key cryptography algorithm is proposed. NARSKCA is based on several symmetric cryptographic algorithms. NARSKCA is very simple that uses character converting algorithm, Fibonacci Number Series, Lucas Number series and bitwise XOR.
Balajee Maram   +2 more
openaire   +3 more sources

RK algorithm: stochastic parallel methodology for symmetric key cryptography [PDF]

open access: yesAPTIKOM Journal on Computer Science and Information Technologies, 2017
With the enormous growth in the Internet and network, data security has become an inevitable concern forany organization. From antecedent security has attracted considerable attention from network researchers. In thisperspective many possible fields of endeavour come to mind with many cryptographic algorithms in a broader way,each is highly worthy and ...
Yegireddi Ramesh, Kiran Kumar Reddi
openaire   +2 more sources

An Enhanced Symmetric Key Cryptography Algorithm to Improve Data Security [PDF]

open access: yesInternational Journal of Computer Applications, 2013
This work uses enhanced symmetric key encryption algorithm, in which same structure of encryption and decryption procedure algorithm is used. In conventional encryption methods the key for encryption and decryption is same and remain secret. The algorithm uses key generation method by random number in algorithm for increasing efficiency of algorithm ...
Vikas Rangari   +2 more
openaire   +1 more source

Enkripsi dan Dekripsi File dengan Algoritma Blowfish pada Perangkat Mobile Berbasis Android

open access: yesJurnal Nasional Teknik Elektro, 2016
Cryptography is one of the ways used to secure data in the form of a file with encrypt files so that others are not entitled to know the file is private and confidential.
Siswo Wardoyo   +2 more
doaj   +1 more source

Static and Dynamic Behavior of Novel Y‐Shaped Sandwich Beams Subjected to Compressive Loadings: Integration of Supervised Learning and Experimentation

open access: yesAdvanced Engineering Materials, EarlyView.
In this study, the mechanical response of Y‐shaped core sandwich beams under compressive loading is investigated, using deep feed‐forward neural networks (DFNNs) for predictive modeling. The DFNN model accurately captures stress–strain behavior, influenced by design parameters and loading rates.
Ali Khalvandi   +4 more
wiley   +1 more source

New Approach for Modifying DES Algorithm by Using Multiple Keys Depend on Heuristic Search Algorithm [PDF]

open access: yesEngineering and Technology Journal, 2013
In this paper, artificial search algorithm(breath algorithm ) are used to design a symmetric key cryptography system based on DES algorithm,the LFSRs and breath algorithm are applied to generate a pseudo-random numbers sequence (PNS) which is used during
Alaa K. Farhan   +3 more
doaj   +1 more source

Beyond Order: Perspectives on Leveraging Machine Learning for Disordered Materials

open access: yesAdvanced Engineering Materials, EarlyView.
This article explores how machine learning (ML) revolutionizes the study and design of disordered materials by uncovering hidden patterns, predicting properties, and optimizing multiscale structures. It highlights key advancements, including generative models, graph neural networks, and hybrid ML‐physics methods, addressing challenges like data ...
Hamidreza Yazdani Sarvestani   +4 more
wiley   +1 more source

A Simulative Approach for the Prediction of Mesoscale Residual Stress Fields in Solution‐Strengthened Ferritic Ductile Iron

open access: yesAdvanced Engineering Materials, EarlyView.
This study presents a 3D representative volume element‐based simulation approach to predict mesoscopic residual stress and strain fields in silicon solid solution‐strengthened ductile cast iron. By modeling phase transformation kinetics with an enhanced Johnson–Mehl–Avrami–Kolmogorov model, the effects of varying cooling rates on residual stresses are ...
Lutz Horbach   +6 more
wiley   +1 more source

Home - About - Disclaimer - Privacy